Chapter 1


CPA Vision Project
The Certified Information Technology Professional Credential

The CITP credential is granted, by the AICPA, only to CPAs.
Applicants require 2000 or more hours of business technology experience in 5 years and have received 200 hours of technology education within the past five years or have demonstrated these requirements by earning the CISA credential.
This CITP is an excellent way for an individual to show both their business and technological skills, while other certificates are narrow by nature. Allowing even more so a CPA's ability to differentiate itself from the rest, only CPA's can be CITPs. CITPs are also allowed the ability to move into new areas of technology. With a CITP credential, an employee can add value to an organization (and, most likely, their pocketbook).
Top 10 Technololgies (2006)
Technically affects virtually all that we do today in some form or fashion. CPAs are trusted business advisers, technologically competent and intricately involved in the flow of information within business.
In order to build member awareness about important and emerging technologies, the AICPA established the Top 10 Technologies list in the late 1980s.
For the fourth year in a row Information Security has been selected as the number one technology to watch in 2006. This includes hardware, software, processes, and procedures in place to protect information systems from internal and external threats.
Due to the advent of SOX, Assurance and Compliance Applications are the number two technology.
Stemming from the tragedy of 9/11 and other disasters to business such as the recent north east blackouts and other natural storms and disasters, or terror attacks comes technology number three Disaster and Business Continuity Planning. This helps a firm recover from events such as those listed prior, and impairments such as theft, viruses, and other malicious distruction.
As many home PC users have experienced, Spyware Detection and Removal comes in at number ten. Malicious spyware can harm your system in many possible ways, yet it largely goes undetected. Spyware can monitor your system information and gather vital information such as passwords and credit cards.
Sarbanes Oxley
infotech.aicpa
The AICPA IT Center provides a venue for CPAs, their clients, employers, and customers to research, monitor, assess, educate, and communicate the impact of technology developments on business solutions.
The AICPA Information Technology (IT) Center serves CPAs who hold the Certified Information Technology Professional (CITP) Credential, members of the AICPA Information Technology Section, and CPAs who want to maximize information technology to increase efficiency and boost profits.



Chapter 2


Radio Frequency Identification (RFID)
RFID is a chap with an antenna that can send and receive data from an RFID reader. RFID chips an be attached to groups of items, such as pallets of groceries, or to individual items, such as shaving razors or pieces of clothing. RFID readers do not require that there be line-of-sight to a chip to be able to read the chip. A reader can obtain data from chips attached to items packed within boxes as the boxespass near the reader.
It's most useful application to date is to track items through the supply chain. For example, amanufactuerer, such as Gillette, would attach an RFID tag to each razor destined for Wal-Mart. RFID readers at the Gillette shipping dock would record the movement of the razors and send data to Gillette's enterprise system to record the shipment/sale. At Wal-Mart's warehouse an RFID reader would read the chips and record the receipt of the razors. Readers throughout the warehouse and retail stores can keep track of the location of the razors. When the razors are sold, RFID readers will read the data and record the sale of each razor, in a manner similar to that used for many years with scanners, UPC codes, and point of sale (POS) systems. In fact, an electronic product code (EPC), has been developed for use with RFID technology, much like the UPC is used with bar codes.
Since RFID does not require line-of-sight between chip and reader, and the reading step is passive (e.g., the reader will locate every chip that passes by), this technology can help to reduce theft. At the same time, this feature has caused some privacy concerns because the chips are not necessarily turned off when the item is sold. Left activated, the chip can track the location of the person carrying the item.
Data on the chips can record the manufacturing date, color, and size of an item. Expiration dates, if any, can be stored and relayed to monitoring systems to move product into sales, price reduction, or disposal, as appropriate. At a cost of 30 cents each, it is presently more feasibly to tag groups of items. The price is expected to soon reach 5 cents each and probably needs to reach 1 to 2 cents each before the technology can be widely adopted.
Advantages, then, of the RFID technology include increased data accuracy, reduced product theft, quicker retail checkout (or self-service checkout), reducted stockouts, more timely deliveries, and better customer service. pg. 458
Net Objects (Blogjects)
A Manifesto for Networked Objects — Cohabiting with Pigeons, Arphids and Aibos in the Internet of Things
Event-Driven Architecture (ObjectRiver)
Object River Master Data Management (MDM) systems can take scattered departments and automatically create a single view of one business entity. Centralization of information with MDM allows for the delivery of high quality information to business applications.

Before a system can be created a data model must be made which describes the enterprise business information. Companies such as are already creating data models with tools such as CA's AllFusion ERwin, for example. To create the system, ObjectRiver MDM reads the model, maps relational information into programmable business objects, and generates a master database and ready-to-use data access software.
Users can start loading the master database and begin writing business rules and applications immediately after the model is developed. Performance is maximized by generated stored procedures and clustered indexing which leverages your database capabilities.
As changes are made the model is updated and the infrastructure is regenerated.
With MDM information can be shared in real-time. To be an effective MDM it must be flexible, adaptable, and interoperable with given IT standards.
Main features of Object River:
  • Model-driven generation, updates and maintenance
  • Extensible, ready to use business objects for Java and Web Services
  • High performance transaction engine
  • Business event factory
  • Automatic audit trails
ObjectRiver MDM lets you describe your enterprise business entities as a data model. From this model, the solution generates a complete database infrastructure.

Anyone want to add links to the ERP vendors, please feel free to do so here.

Click here for top ERP vendors and a link to thier website

Tiny ERP - A free and open source ERP/CRM system with accounting, inventory management, sales, purchasing, task-automation, marketing, and point-of-sale features. While I doubt this is something that any of us will have to run into in a professional environment, it might be interesting to download and/or play around with the software. Looks like versions are available for both Windows and Linux.
Panorama consulting- The business media generally focuses on the large ERP vendors, such as SAP, Oracle, and Microsoft. However, niche players are starting to make inroads in the ERP market. This, to some degree at least, is forcing the big guys to more aggressively protect their market shares and customer bases. This article gives an interesting look at the ERP market, as well as some of the challenges the traditional and larger ERP vendors are facing.